Penguicon 6.0 -- Penguins in Space!
BONUS: Video interview with Benjamin Mako Hill, and bragging rights if you can identify the birds twittering in the background...
A couple weeks back, I headed down to Penguicon 6.0. It's a Linux convention, but also a Science Fiction convention. Really, it's like a geeky version of, "Hey your chocolate is in my peanut butter." My intention at the time was to record lots and lots of footage, so Linux Journal readers could get a real feel for the con, from the comfort of their local Internet feed. As it turns out, although I was willing to be on camera, that wasn't the case with most people. Here is a very short glimpse of Penguicon 2008:
I also had the privledge of interviewing Benjamin Mako Hill, who was at Penguicon representing the FSF and the OLPC. The con was so busy, we had to go outside for the interview, and unfortunately, my camera was amazing at recording traffic noise, and not so great at recording voices. I can only assure you the audio is much better than the original cut, but it's still far from great. (NOTE: Special thanks to Ryan Busch for being my camera man. The audio problem isn't his fault at all.)
So that's it for Penguicon 2008. Maybe next year, I'll either get more video footage, or at the very least set my expectations lower. I'll be there, however, so if you're planning to go to Penguicon 2009 -- be sure to look me up!
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- ACI Worldwide's UP Retail Payments
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide